Job ID :
33341
Company :
Internal Postings
Location :
Irving, TX
Type :
Contract
Duration :
12 Months
Salary :
DOE
Status :
Active
Openings :
1
Posted :
07 Sep 2021
Job Seekers, Please send resumes to resumes@hireitpeople.com

Must Have Skills:

  • Rapid 7

Nice to have skills:

  • Manage vulnerabilities across applications, endpoints, databases, networking devices, and mobile, cloud and third-party assets
  • Conduct continuous discovery and vulnerability assessment of enterprisewide assets

Detailed Job Description:

  • Document, prioritize and formally report asset and vulnerability state, along with remediation recommendations and validation.
  • Communicate vulnerability results in a manner understood by technical and non-technical business units based on risk tolerance and threat to the business, and gain support through influential messaging.
  • Leverage vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds. 
  • Support internal and external auditors in their duties that focus on compliance and risk reduction.
  • Collaborate with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface.
  • Work closely with infrastructure teams to advise and support remediation efforts to close vulnerability exposure to new threats in the wild and verify the organization s security posture against them.
  • Regularly research and learn new TTPs in public and closed forums, and work with colleagues to assess risk and implement/validate controls as necessary.
  • Maintain an active database comprising third-party assets, their vulnerability state, remediation recommendations, overall security posture and potential threat to the business.
  • Arrange and provide support to business units launching new technology applications and services to verify that new products/offerings are not at risk of misconfiguration, compromise or information leakage.
  • Periodically attend and participate in change management policy discussions and meetings.
  • Perform other duties as assigned.

Top 3 responsibilities you would expect the Subcon to shoulder and execute:

  1. Define key performance indicators KPIs and metrics across business units to illustrate effectiveness with vulnerability management.
  2. Understand breach and attack simulation solutions for known vulnerabilities and work with the team to validate controls effectiveness
  3. Liaise with the security engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities.